Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

A COmprehensive cyber-intelligence framework for resilient coLLABorative manufacturing Systems

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Publications

A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures (opens in new window)

Author(s): Eva Papadogiannaki, Sotiris Ioannidis
Published in: ACM Computing Surveys, Issue 54/6, 2022, ISSN 1557-7341
Publisher: Association for Computing Machinary, Inc.
DOI: 10.1145/3457904

On Architectural Support for Instruction Set Randomization (opens in new window)

Author(s): George Christou, Giorgos Vasiliadis, Vassilis Papaefstathiou, Antonis Papadogiannakis, Sotiris Ioannidis
Published in: ACM Transactions on Architecture and Code Optimization, Issue 17/4, 2020, Page(s) 1-26, ISSN 1544-3566
Publisher: Association for Computing Machinary, Inc.
DOI: 10.1145/3419841

A Hessian inversion-free exact second order method for distributed consensus optimization (opens in new window)

Author(s): Dušan Jakovetić, Nataša Krejić and Nataša Krklec Jerinkić
Published in: IEEE Transactions on Signal and Information Processing over Networks, Issue 8, 2022, ISSN 2373-776X
Publisher: IEEE
DOI: 10.1109/tsipn.2022.3203860

LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks (opens in new window)

Author(s): Pallavi Kaliyar, Wafa Ben Jaballah, Mauro Conti, Chhagan Lal
Published in: Computers & Security, Issue 94, 2020, ISSN 0167-4048
Publisher: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2020.101849

Machine and Deep Learning Solutions for Intrusion Detection and Prevention in IoTs: A Survey (opens in new window)

Author(s): Pls Jayalaxmi, Rahul Saha, Gulshan Kumar, Mauro Conti, Tai-Hoon Kim
Published in: IEEE Access, Issue 10, 2022, ISSN 2169-3536
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2022.3220622

A Zero-Trust Architecture for Remote Access in Industrial IoT Infrastructures (opens in new window)

Author(s): Fabio Federici; Davide Martintoni; Valerio Senni
Published in: Volume 12, Issue 5, 2022, ISSN 0000-0000
Publisher: MDPI
DOI: 10.3390/electronics12030566

RESEKRA: Remote Enrollment Using SEaled Keys for Remote Attestation (opens in new window)

Author(s): Ernesto Gómez-Marín; Luis Parrilla; Gianfranco Mauro; Antonio Escobar-Molero; Diego P. Morales; Encarnación Castillo
Published in: Sensors, Issue 7, 2022, ISSN 1424-8220
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s22135060

A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions (opens in new window)

Author(s): Ashish Kumar, Rahul Saha, Mauro Conti, Gulshan Kumar, William J Buchanan, Tai Hoon Kim
Published in: Journal of Network and Computer Applications, Issue 204, 2022, ISSN 1084-8045
Publisher: Academic Press
DOI: 10.1016/j.jnca.2022.103414

Distributed Recursive Estimation Under Heavy-Tail Communication Noise

Author(s): D. Jakovetic, M. Vukovic, D. Bajovic, A. K. Sahu, S. Kar
Published in: SIAM Journal on Control and Optimization, 2022, ISSN 0363-0129
Publisher: Society for Industrial and Applied Mathematics

Adaptive Intrusion Detection in Edge Computing using Cerebellar Model Articulation Controller and Spline Fit (opens in new window)

Author(s): Gulshan Kumar, Rahul Saha, Mauro Conti, Reji Thomas, Tannishtha Devgun and JPC Rodrigues
Published in: IEEE Transactions on Services Computing, Issue Early Access, 2022, ISSN 0000-0000
Publisher: IEEE
DOI: 10.1109/tsc.2022.3178471

EFIX: Exact fixed point methods for distributed optimization (opens in new window)

Author(s): Dušan Jakovetić, Nataša Krejić and Nataša Krklec Jerinkić
Published in: Journal of Global Optimization, 2022, Page(s) 1-25, ISSN 1573-2916
Publisher: Springer
DOI: 10.1007/s10898-022-01221-4

Distributed nonlinear state estimation in electric power systems using graph neural networks (opens in new window)

Author(s): Ognjen Kundacina, Mirsad Cosovic, Dragisa Miskovic and Dejan Vukobratovic.
Published in: IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), 2022, 2022, Page(s) 8-13
Publisher: IEEE
DOI: 10.1109/smartgridcomm52983.2022.9960967

The Million Dollar Handshake Secure and Attested Communications in the Cloud

Author(s): Nikolaos Chalkiadakis, Dimitris Deyannis, Dimitris Karnikis, Giorgos Vasiliadis, Sotiris Ioannidis
Published in: Conference: IEEE CLOUD 2020, 2020
Publisher: TBD

Andromeda: Enabling Secure Enclaves For The Android Ecosystem (opens in new window)

Author(s): Dimitris Deyannis, Dimitris Karnikis, Giorgos Vasiliadis, and Sotiris Ioannidis.
Published in: 24th Information Security Conference (ISC)., Issue LNSC, volume 13118, 2021
Publisher: Spinger
DOI: 10.1007/978-3-030-91356-4_11

Machine learning methods for device identification using wireless fingerprinting. (opens in new window)

Author(s): Srđan Šobot, Vukan Ninković, Dejan Vukobratović, Milan Pavlović and Miloš Radovanović
Published in: 5th International Balkan Conference on Communications and Networking (BalkanCom), Sarajevo, Bosnia and Herzegovina, 2022, Page(s) 83-188
Publisher: IEEE
DOI: 10.1109/balkancom55633.2022.9900723

PoSC: Combined Score for Consensus in Intemet-of-Things Applications (opens in new window)

Author(s): Arshdeep Singh, Rahul Saha, Mauro Conti, Gulshan Kumar
Published in: Fourth International Conference on Blockchain Computing and Applications (BCCA), 2022
Publisher: IEEE
DOI: 10.1109/bcca55292.2022.9922056

On Matrix Multiplication with Homomorphic Encryption (opens in new window)

Author(s): Panagiotis Rizomiliotis; Aikaterini Triakosia
Published in: In Proceedings of the 2022 on Cloud Computing Security Workshop (CCSW'22), Issue 7, 2022, ISBN 9781450398756
Publisher: ACM
DOI: 10.1145/3560810.3564267

Risk-driven Model-based Architecture Design for Secure Information Flows in Manufacturing Infrastructures (opens in new window)

Author(s): Loris Dal Lago, Fabio Federici, Davide Martintoni, Valerio Senni
Published in: SECRYPT 2022, 2022, Page(s) 499-506
Publisher: ScitePress
DOI: 10.5220/0011144700003283

An enclave assisted snapshot-based kernel integrity monitor (opens in new window)

Author(s): Dimitris Deyannis, Dimitris Karnikis, Giorgos Vasiliadis, Sotiris Ioannidis
Published in: Proceedings of the Third ACM International Workshop on Edge Systems, Analytics and Networking, 2020, Page(s) 19-24, ISBN 9781450371322
Publisher: ACM
DOI: 10.1145/3378679.3394539

Towards achieving confidentiality in Hyperledger Fabric (opens in new window)

Author(s): Benedikt Hofmann, Prabhakaran Kasinathan, Martin Wimmer
Published in: IEEE International Conference on Blockchain (Blockchain), 2022
Publisher: IEEE
DOI: 10.1109/blockchain55522.2022.00060

Secure Remote Maintenance via Workflow-Driven Security Framework (opens in new window)

Author(s): Kasinathan, Prabhakaran, Davide Martinoni, Benedikt Hofmann, Valerio Senni, Martin Wimmer
Published in: Conference: IEEE Blockchain 2021, 2021
Publisher: IEEE
DOI: 10.1109/blockchain53845.2021.00016

Employing a consensus nonlinearity in distributed estimation under heavy-tail noise

Author(s): Manojlo Vukovic, Dusan Jakovetic, Dragana Bajovic, Anit Kumar Sahu, Soummya Kar
Published in: 32nd EURO 2022 Conference, 2022
Publisher: In selected journals by the conference

SoK: Secure Aggregation Based on Cryptographic Schemes for Federated Learning (opens in new window)

Author(s): Mohamad Mansouri, Melek Onen, Wafa Ben Jaballah, Mauro Conti
Published in: Privacy Enhancing Technologies Symposium (PETS), 2023, Page(s) 140–157
Publisher: N/A
DOI: 10.56553/popets-2023-0009

Learning from Failures: Secure and Fault-Tolerant Aggregation for Federated Learning (opens in new window)

Author(s): Mohamad Mansouri, Melek Onen, Wafa Ben Jaballah
Published in: Annual Computer Security Applications Conference (ACSAC 2022), 2022, Page(s) 146-158
Publisher: N/A
DOI: 10.1145/3564625.3568135

Network Intrusion Detection in Encrypted Traffic (opens in new window)

Author(s): Eva Papadogiannaki, Giorgos Tsirantonakis, Sotiris Ioannidis
Published in: The Fourth International Workshop on Secure Smart Societies in Next Generation Networks (IEEE DSC 2022), 2022
Publisher: IEEE
DOI: 10.1109/dsc54232.2022.9888942

, Edge Machine Learning in 3GPP NB-IoT: Architecture, Applications and Demonstration (opens in new window)

Author(s): D. Vukobratovic, M. Lukic, I. Mezei, D. Bajovic, D. Danilovic, M. Savic, Z. Bodroski, S. Skrbic, D. Jakovetic
Published in: European Signal Processing Conference, EUSIPCO 2022, 2022, Page(s) 707-711
Publisher: IEEE
DOI: 10.23919/eusipco55093.2022.9909793

Sensitive information protection in blockchain-based supply-chain management for aerospace (opens in new window)

Author(s): Davide Martintoni, Valerio Senni, Ernesto Gomez Marin, Javier Cabrera Gutierrez
Published in: IEEE International Conference on Omni-layer Intelligent Systems (COINS), 2022, 2022
Publisher: IEEE
DOI: 10.1109/coins54846.2022.9854974

Homomorphic Encryption in Manufacturing Compliance Checks (opens in new window)

Author(s): Aikaterini Triakosia, Panagiotis Rizomiliotis, Konstantinos Tserpes, Cecilia Tonelli, Valerio Senni, Fabio Federici
Published in: Trust, Privacy and Security in Digital Business - 19th International Conference, TrustBus 2022, Issue LNCS, volume 13582, 2022
Publisher: Springer
DOI: 10.1007/978-3-031-17926-6_6

Gradient Based Clustering (opens in new window)

Author(s): Aleksandar Armacki; Dragana Bajovic; Dusan Jakovetic; Soummya Kar
Published in: The Thirty-ninth International Conference on Machine Learning, Issue 10, 2022, ISSN 2640-3498
Publisher: Proceedings of Machine Learning Research
DOI: 10.5281/zenodo.7007266

Peek-a-boo - i see your smart home activities, even encrypted! (opens in new window)

Author(s): Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, Selcuk Uluagac
Published in: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020, Page(s) 207-218, ISBN 9781450380065
Publisher: ACM
DOI: 10.1145/3395351.3399421

Partially Oblivious Neural Network Inference (opens in new window)

Author(s): P. Rizomiliotis, C. Diou, A. Triakosia, E. Kyranas, K. Tserpes
Published in: 19th International Conference on Security and Cryptography SECRYPT 2022, 2022, Page(s) 158-169
Publisher: ScitePress
DOI: 10.5220/0011272500003283

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0